General

  • Target

    eb90606e9ab8375df5c48dd9fbcc9e5a0f672738f49c58b1dc38833790aa48a8

  • Size

    750KB

  • Sample

    230601-mem36adg28

  • MD5

    6a5f939e1ecae2678a3956d7a854ed0f

  • SHA1

    bcc67ad78d21032b6fdcd9bc11738948aad05919

  • SHA256

    eb90606e9ab8375df5c48dd9fbcc9e5a0f672738f49c58b1dc38833790aa48a8

  • SHA512

    88fbfa3f795c00987ccfdefd08b0287021c66eeab17305827e9055ccc46d2f56875f935c7c8e593e95b871cfb8feeb8f721f9cef1f3a0c94d76e7f66829ddbff

  • SSDEEP

    12288:yMray90kLJ5dpma/rtT333mMWcP/jdGCbrjTzj7DVfMdl2FYD8Zhdm0O67r:Uy3NB3mMzHECbrn7Dm/uZbm0O8r

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.127:19045

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

rocker

C2

83.97.73.127:19045

Attributes
  • auth_value

    b4693c25843b5a1c7d63376e73e32dae

Targets

    • Target

      eb90606e9ab8375df5c48dd9fbcc9e5a0f672738f49c58b1dc38833790aa48a8

    • Size

      750KB

    • MD5

      6a5f939e1ecae2678a3956d7a854ed0f

    • SHA1

      bcc67ad78d21032b6fdcd9bc11738948aad05919

    • SHA256

      eb90606e9ab8375df5c48dd9fbcc9e5a0f672738f49c58b1dc38833790aa48a8

    • SHA512

      88fbfa3f795c00987ccfdefd08b0287021c66eeab17305827e9055ccc46d2f56875f935c7c8e593e95b871cfb8feeb8f721f9cef1f3a0c94d76e7f66829ddbff

    • SSDEEP

      12288:yMray90kLJ5dpma/rtT333mMWcP/jdGCbrjTzj7DVfMdl2FYD8Zhdm0O67r:Uy3NB3mMzHECbrn7Dm/uZbm0O8r

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks